• 제목/요약/키워드: Privacy Protection

검색결과 880건 처리시간 0.031초

u-City 환경에서 지능형 CCTV를 이용한 감시시스템 구현 및 감시방법 (A Monitoring Way and Installation of Monitoring System using Intelligent CCTV under the u-City Environment)

  • 김익순;유재덕;김배훈
    • 한국전자통신학회논문지
    • /
    • 제3권4호
    • /
    • pp.295-303
    • /
    • 2008
  • 개개인의 사생활 보호와 인권존중이라는 명분하에 감시시스템에 대한 비판적 시각으로 인해 그동안 침체되었던 CCTV 시장이 911 테러 이후 보안에 대한 중요성 제고와 사회적 범죄 예방에 대한 의식변화로 인해 전 세계적으로 새로운 국면을 맡고 있는 상황에 국내의 첨단 IT기술과의 접목을 통한지능형 감시시스템으로의 변화를 꾀하고 있으며 원격지에서 사각지대 없이 촬영된 영상을 인터넷을 통하여 어느 지역에서도 실시간으로 감시 및 제어할 수 있어 연구하고자 한다.

  • PDF

PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구 (The Pattern Search and Complete Elimination Method of Important Private Data in PC)

  • 서미숙;박대우
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.213-216
    • /
    • 2013
  • 인터넷의 발달과 유무선 네트워크 인프라 기술의 발전으로 빅테이터 및 개인정보보의 활용이 많아지고 있다. 하지만 개인정보보호법의 시행에도 불구하고, 개인정보 유출로 인한 침해사고가 발생하고 있다. 개인정보 유출은 개인의 사생활피해와 금융피해로 연관된다. 따라서 개인정보의 탐색 및 검출과정에서 개인정보의 패턴을 분석하여 추출하는 연구와 불필요한 개인정보의 완전삭제에 관한 연구가 필요하다. 본 연구에서는 개인정보보호에 대한 패턴추출 연구와 완전삭제 방법을 연구하여 개인정보의 패턴추출 및 완전삭제 실험을 하였다.

  • PDF

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data

  • Lee, Hyunjo;Song, Youngho;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • 제14권5호
    • /
    • pp.1087-1101
    • /
    • 2018
  • As cloud computing has become a widespread technology, malicious attackers can obtain the private information of users that has leaked from the service provider in the outsourced databases. To resolve the problem, it is necessary to encrypt the database prior to outsourcing it to the service provider. However, the most existing data encryption schemes cannot process a query without decrypting the encrypted databases. Moreover, because the amount of the data is large, it takes too much time to decrypt all the data. For this, Programmable Order-Preserving Secure Index Scheme (POPIS) was proposed to hide the original data while performing query processing without decryption. However, POPIS is weak to both order matching attacks and data count attacks. To overcome the limitations, we propose a group order-preserving data encryption scheme (GOPES) that can support efficient query processing over the encrypted data. Since GOPES can preserve the order of each data group by generating the signatures of the encrypted data, it can provide a high degree of data privacy protection. Finally, it is shown that GOPES is better than the existing POPIS, with respect to both order matching attacks and data count attacks.

인권적 관점에서 본 인터넷 거버넌스 (Internet Governance in the light of Human Rights)

  • 박성훈
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증 (Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment)

  • 이용환;얀워너;야노스스테파노비치
    • 인터넷정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.139-149
    • /
    • 2009
  • 본 논문에서는 데이터 보호 규정에 관련된 요구사항들이나 규칙들이 소프트웨어에 잘 표현되어 있는지를 검증하기 위하여 도메인 고유의 언어인 DSML(Domain Specific Modeling Language)을 사용해 정책을 정규화 혹은 계산적 표현에 관련된 솔루션을 제시하고 있다. 모든 정책들은 공식적으로 프롤로그( Prolog) 언어 기반으로 표현된 후 DSML에 통합되며 정책검증은 요구사항 준수가 언제 평가되어야 하는지에 따라 정적 정책검증과 동적 정책검증의 두가지 정책이 존재한다.

  • PDF

센서 시스템에서의 고신뢰 물리적 복제방지 기능의 저전력 칩 설계 및 구현 (Design and Implementation of a Low Power Chip with Robust Physical Unclonable Functions on Sensor Systems)

  • 최재민;김경기
    • 센서학회지
    • /
    • 제27권1호
    • /
    • pp.59-63
    • /
    • 2018
  • Among Internet of things (IoT) applications, the most demanding requirements for the widespread realization of many IoT visions are security and low power. In terms of security, IoT applications include tasks that are rarely addressed before such as secure computation, trusted sensing, and communication, privacy, and so on. These tasks ask for new and better techniques for the protection of data, software, and hardware. An integral part of hardware cryptographic primitives are secret keys and unique IDs. Physical Unclonable Functions(PUF) are a unique class of circuits that leverage the inherent variations in manufacturing process to create unique, unclonable IDs and secret keys. In this paper, we propose a low power Arbiter PUF circuit with low error rate and high reliability compared with conventional arbiter PUFs. The proposed PUF utilizes a power gating structure to save the power consumption in sleep mode, and uses a razor flip-flop to increase reliability. PUF has been designed and implemented using a FPGA and a ASIC chip (a 0.35 um technology). Experimental results show that our proposed PUF solves the metastability problem and reduce the power consumption of PUF compared to the conventional Arbiter PUF. It is expected that the proposed PUF can be used in systems required low power consumption and high reliability such as low power encryption processors and low power biomedical systems.

SVM을 이용한 플로우 기반 P2P 트래픽 식별 (Flow-based P2P Traffic Identification using SVM)

  • 엄남경;우성희;이상호
    • 한국컴퓨터정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.123-130
    • /
    • 2008
  • P2P 응용 프로그램들은 일반적으로 방화벽과 같은 보호시스템을 피하기 위해, 동적인 포트 번호 등을 사용하기도 한다. 그에 따라 포트 기반의 방법과 시그너처, 패킷 페이로드의 전수 검사 등을 통해 트래픽 식별을 하는 많은 방법론을 이용하지만, 여전히 정성적인 면과 정량적인 면을 만족시키지 못하고 있다. 따라서 이 논문에서는 P2P가 기본적으로 가지는 프로토콜의 성격을 이용하여 P2P의 트래픽 특성들을 분석하고 플로우 단위로 트래픽을 수집한 후, SVM을 이용하여 P2P 트래픽을 식별할 수 있는 방법론을 제안하고자 한다.

  • PDF

국제 지식재산권 분쟁해결을 위한 중재의 활성화 방안 - 국내 ADR 기관의 발전방안을 중심으로- (Promoting an Arbitration System for International Dispute Resolution in Intellectual Property Rights Cases)

  • 이주연
    • 한국중재학회지:중재연구
    • /
    • 제23권2호
    • /
    • pp.165-190
    • /
    • 2013
  • As intellectual property rights are perceived as the key element of creating added values and securing competitiveness, the result of intellectual property rights disputes play an important role in the success of companies. As seen from above strong points of an Alternative Dispute Resolution (ADR) system in Chapter III, intellectual property rights disputes increasingly tend to be resolved by ADR rather than litigation. Discussions about and operation of ADR are already being actively carried out in many countries, and major ADR institutions have been acquiring experience in a variety of intellectual property rights disputes. To enhance the use and recognition of ADR as the way of resolving the Intellectual Property Rights disputes in Korea, this study suggested the following three ways. First, domestic ADR institutions, the Korean Commercial Arbitration Board (KCAB) will need to establish cooperative systems with prominent overseas institutions to lead the disputing parties to fair resolutions as well as to instill trust in international arbitration institutions. Second, they will need to contribute to the promotion of arbitration systems throughout society by developing and applying a variety of arbitration systems as well as securing a pool of professionals. Finally, the arbitration rules will need to be continuously improved to deal with disputes promptly and reinforce privacy protection.

  • PDF

도시단독주택지 가로공간 계획을 위한 거주자 만족도 분석 연구 (A Study on the Residential Satisfaction Analysis for Street Space Design in Detached House Area)

  • 김주현;문지원
    • 한국주거학회논문집
    • /
    • 제21권4호
    • /
    • pp.129-137
    • /
    • 2010
  • This study surveys the degree of residents' satisfaction on the current street space to suggest alternatives for the improvement of the street space design in detached house areas. In the results of the survey, we find the following. First, in the result of analysis on age, residential term, having children or not, income level, and type of house ownership, residents are homogeneous in social and economic characteristics. There are similarity in geographical, locational conditions, neighboring facilities, deterioration of residential house, and the time of residential formation among residential areas. Second, satisfactory determinants of residents on street space according to street types, are maintenance, protection of privacy, and parking space. Third, satisfactory determinants of residents on street hierarchy is the inner circulation road while unsatisfactory one is the inner roads. Fourth, age, residential term and type of house ownership are significant factors influencing residents' satisfaction. Factors influencing satisfaction on street space are also affecting total satisfaction and factors associated with street environment are perceived more important ones than factors associated with street activities. Thus we find the degrees of satisfaction for residents on street type and street hierarchy are different despite that general characteristics of residents are similar. We also find residents consider street noise and maintenance as critical factor among physical factors of street space.

법을 통한 인터넷 건강정보 관리 방안 (Legal Measures for Handling Internet Health Information)

  • 서미경
    • 보건교육건강증진학회지
    • /
    • 제20권1호
    • /
    • pp.61-76
    • /
    • 2003
  • As people get broader access to health information through the internet, there is a greater need for measure to maximize the social advantages of the internet and to minimize negative side-effects. With this concern, this paper classifies internet health information services sites into : on-line supply of health information, on-line consultation, on-line diagnosis, and on-line sales. As well this paper analyzes domestic laws supporting and/or regulating these services. The efficient provision of internet health services requires comprehensive laws on individual privacy protection, prevention and handling of medical accidents, an electronic prescription form for internet diagnosis, electronic signing, payment for medical expenses, qualifications for internet medical practitioners. Additional laws are required to establish internet pharmacies and internet health goods stores. These new laws can be prepared either separately or through revision of existing laws governing medical practice, pharmacies, and public health promotion. However, as the legal control by the government on cyber processes and entities has a fairly minimal effect, consumers should be encouraged to improve their own capacity for wisely using internet health services and health-service providers should be encouraged to promote voluntary supervision and control of their own services and practices.